Analysis
-
max time kernel
107s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-09-2022 02:48
Static task
static1
Behavioral task
behavioral1
Sample
4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe
Resource
win7-20220901-en
General
-
Target
4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe
-
Size
1.1MB
-
MD5
07529dbc5603cacb426137b0fa110e46
-
SHA1
7f88cf7634a633bf2d311fb1f24726c5d5a88259
-
SHA256
4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad
-
SHA512
7676810ebc8394fbd0b84e3b7f9d6e06afa8edf3e93e80aeacf842deacfb1a13190b1238ff2212ff4f1ad831388f4e862328547317a24ddecac0b229e3ca73bc
-
SSDEEP
24576:93KpBwAVg/iAsm4jsPGWjz+Toleqz7Pqyz+/m5ijbLHB:Uww0eooyTqyS/mEvjB
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1976 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 27 PID 1456 wrote to memory of 1976 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 27 PID 1456 wrote to memory of 1976 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 27 PID 1456 wrote to memory of 1976 1456 4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe"C:\Users\Admin\AppData\Local\Temp\4064c1351b8230044acd3b03b5a4bc856c6cfb05676a42f041d8094297ea33ad.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt8278.bat2⤵PID:1976
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59088c37055256eabb9ec6585d6ff3778
SHA125f8f87d4e64f3f2c2bf1673ade6586bd51df518
SHA256c6c25e54831235db692131b6071805aa8ef75bc8fa3669d4d5c9f5d78a205563
SHA5126d3a994a4dd018baab34ee72446f0fb5d456c560414bdeab65cd00019d51a498e084fe08300a918755f6de4ac12fcd1c6ac4dcf0abd72c8ea190c555ff67d3ee